Sciweavers

1414 search results - page 101 / 283
» Combining Intruder Theories
Sort
View
KBSE
2000
IEEE
14 years 3 months ago
Circular Coinductive Rewriting
Circular coinductive rewriting is a new method for proving behavioral properties, that combines behavioral rewriting with circular coinduction. This method is implemented in our n...
Joseph A. Goguen, Kai Lin, Grigore Rosu
ICRA
1999
IEEE
133views Robotics» more  ICRA 1999»
14 years 3 months ago
Control of Flexible-Manufacturing Workcells Using Extended Moore Automata
The modeling and control flexible-manufacturing workcells (FMCs) has generally been performed in a hierarchical structure, where at the highest level they have been modeled as dis...
A. Ramírez, C. Sriskandarajah, Beno Benhabi...
CSFW
1997
IEEE
14 years 3 months ago
Verifying authentication protocols with CSP
This paper presents a general approach for analysis and veri cation of authentication properties in the language of Communicating Sequential Processes (CSP). It is illustrated by ...
Steve Schneider
ICTAI
1994
IEEE
14 years 3 months ago
A Knowledge Representation System for Integration of General and Case-Specific Knowledge
Combining various knowledge types - and reasoning methods - in knowledge-based systems is a challenge to the knowledge representation task. The paper describes an object-oriented,...
Agnar Aamodt
CTCS
1989
Springer
14 years 3 months ago
Temporal Structures
We combine the principles of the Floyd-Warshall-Kleene algorithm, enriched categories, and Birkhoff arithmetic, to yield a useful class of algebras of transitive vertex-labeled s...
Ross Casley, Roger F. Crew, José Meseguer, ...